|
Search the dblp DataBase
Christophe Giraud:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christophe Giraud, Erik Woodward Knudsen
Fault Attacks on Signature Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:478-491 [Conf]
- Christophe Giraud
DFA on AES. [Citation Graph (0, 0)][DBLP] AES Conference, 2004, pp:27-41 [Conf]
- Christophe Giraud, Hugues Thiebeauld
A Survey on Fault Attacks. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:159-176 [Conf]
- Mehdi-Laurent Akkar, Christophe Giraud
An Implementation of DES and AES, Secure against Some Attacks. [Citation Graph (0, 0)][DBLP] CHES, 2001, pp:309-318 [Conf]
- Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier
Provably Secure S-Box Implementation Based on Fourier Transform. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:216-230 [Conf]
- Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
Enhanced Security Architecture for Music Distribution on Mobile. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:97-109 [Conf]
- Mathieu Ciet, Christophe Giraud
Transient Fault Induction Attacks on XTR. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:440-451 [Conf]
- Christophe Giraud
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2006, v:55, n:9, pp:1116-1120 [Journal]
Improved Fault Analysis of Signature Schemes. [Citation Graph (, )][DBLP]
Atomicity Improvement for Elliptic Curve Scalar Multiplication. [Citation Graph (, )][DBLP]
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. [Citation Graph (, )][DBLP]
Securing AES Implementation against Fault Attacks. [Citation Graph (, )][DBLP]
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. [Citation Graph (, )][DBLP]
Atomicity Improvement for Elliptic Curve Scalar Multiplication [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|